DB Recovery Systems Mcqs

Our collections of Multiple choice questions and answers focuses on study of ” DB Recovery Systems “. These questions are chosen from a collection of most authoritative and best reference books on DBMS. Our aim is to prepare an individual for competitive exams like NTS | GAT | ECAT | Data Warehouse jobs | Data Mining | DB administration jobs | Nadra Jobs | Software House and Data Base and Web Developer jobs | University and College entrance exams and various tests and job interviews. One should practice our Mcqs to assimilate knowledge on DB Recovery Systems comprehensively.

  1. Home
  2. »
  3. Computer Science Mcqs
  4. »
  5. DBMS Mcqs
  6. »
  7. DB Recovery Systems Mcqs

1.
Which of the following is not a recovery technique?

Deferred update

Immediate update

Two-phase commit

Recovery management

2.
Checkpoints are a part of

Recovery measures

Security measures

Concurrency measures

Authorization measures

3.
……. deals with soft errors, such as power failures.

System recovery

Media recovery

Database recovery

Failure recovery

4.
Rollback of transactions is normally used to :

Recover from transaction failure

Update the transaction

Retrieve old records

Repeat a transaction

5.
A transaction performs on the isolation level of the Read Uncommitted if :

A dirty read occurs

Non-repeatable read occurs

Phantom reads occurs

All of the above

6.
Which commands are used to control which users have which privilege over which objects ?

QUE and QUIST

GRANT and REVOKE

CASECADE and MVD

None of the above

7.
When a deadlock is detected the recovery is normally accomplished by :

Rollback of transaction

Locking of data

Consistency checking

None of these

8.
Which is not a desirable property of a transaction ?

Isolation

Atomicity

Durability

All are desirable

9.
A directed graph which represents the deadlock is called :

Cycle graph

Deadlock graph

Wait-for graph

None of the above

10.
Transaction Throughput is :

Elapsed Time between submitting a transaction and receiving a transaction.

Average no. of transaction processed per second.

No. of resources used by a transaction.

None of the above

11.
Data encryption techniques are particularly useful for

Reducing storage space requirements

Improving data integrity

Protecting data in data communication systems

All of the above

12.
Before any changes to database structure are attempted one should first:

Clearly understand the current structure and contents of the database only.

Test any changes on a test database only.

Create a complete backup of the operational database only.

All of the above should be done.

13.
Which of the following modifications may not succeed?

Changing a column data type from char to date

Changing a column data type from numeric to char

Both of the above actions should succeed.

Neither of the above actions will succeed.

14.
Because of the importance of making data model changes correctly, many professionals are ________ about using an automated process for database redesign.

Optimistic

Skeptical

Ambivalent

None of the above is correct.

15.
Which of the following can cause a transaction failure

Logical error

System error

More than one of the mentioned

None of the mentioned

error: You are not allowed to do so.....
0Shares
0
Scroll to Top